cieConfiguredAlgorithms |
.1.3.6.1.4.1.9.9.52.1.1.1 |
Type of encryption configured on a particular router,
encoded as a bit-string.
A router can support multiple encryption algorithms
i.e. 56 bit des with 8 bit cipher feedback AND 40 bit des
with 64 bit cipher feedback.
|
cieEncryptionKeyTimeout |
.1.3.6.1.4.1.9.9.52.1.1.2 |
Interval at which keys expire for a session and they are is
re-negotiated.
|
cieNumberOfCryptoEngines |
.1.3.6.1.4.1.9.9.52.1.1.3 |
Total number of encryption engines.
|
cieEngineStatusEntry |
.1.3.6.1.4.1.9.9.52.1.2.1.1 |
Each entry in this table describes public key associated with
each engine, with its unique ID. In case of hardware assisted
encryption each entry also describes status of encryption port
adaptor.
|
cieNumberOfConnections |
.1.3.6.1.4.1.9.9.52.1.3.1 |
Total number of active, pending and dead crypto connections.
|
cieConnEntry |
.1.3.6.1.4.1.9.9.52.1.3.2.1 |
This entry describes a connection viz. the protected and
unprotected node, status of the connection and number of
packets encrypted, decrypted per connection and algorithm
used for encrypting data.
Each entry also contains a pointer to crypto engine that is
performing the encryption.
|
cieTestConnEntry |
.1.3.6.1.4.1.9.9.52.1.4.1.1 |
A encryption test entry.
A management station wishing to create an entry should
first generate a pseudo-random serial number to be used
as the index to this sparse table. The station should
then create the associated instance of the row status
and row owner objects. It must also, either in the same
or in successive PDUs, create the associated instance of
the address objects.
Once the appropriate instance of all the configuration
objects have been created, either by an explicit SNMP
set request, the row status should be set
to active to initiate the request. Note that this entire
procedure may be initiated via a single set request which
specifies a row status of createAndGo.
Once the connection sequence has been activated, it cannot be
stopped -- it will run until a crypto connection has been
established between source and destination.
Once the sequence completes, the management station should
retrieve the values of the status objects of interest, and
should then delete the entry. In order to prevent old
entries from clogging the table, entries will be aged out
30 minutes after they are created.
|
cieEngineID |
.1.3.6.1.4.1.9.9.52.1.2.1.1.1 |
Unique value identifying the crypto engine, in case
of RP and other software only platforms, this is the
processor ID. In case of ESA, this will be a unique ID
retrieved from ESA.
|
cieEngineCardIndex |
.1.3.6.1.4.1.9.9.52.1.2.1.1.2 |
Corresponds to cardIndex in the chassis mib, if value is 0
then this is a software encryption engine.
|
cieEnginePublicKey |
.1.3.6.1.4.1.9.9.52.1.2.1.1.3 |
Public key for a particular crypto engine.
|
cieEsaTampered |
.1.3.6.1.4.1.9.9.52.1.2.1.1.4 |
Indicates whether encryption port adaptor has been tampered
with.
NOTE: This object is not present for software encryption
engines.
|
cieEsaAuthenticated |
.1.3.6.1.4.1.9.9.52.1.2.1.1.5 |
Indicates whether encryption port adaptor has been properly
authenticated for this router.
NOTE: This object is not present for software encryption
engines.
|
cieEsaMode |
.1.3.6.1.4.1.9.9.52.1.2.1.1.6 |
Indicates current operating mode of the ESA card.
This variable directly corresponds to LED status shown on ESA.
NOTE: This object is not present for software encryption
engines.
|
cieConnIndex |
.1.3.6.1.4.1.9.9.52.1.3.2.1.1 |
A monotonically increasing integer for the sole purpose of
indexing the cieConnTable. When it reaches the
maximum value, the agent wraps the value back to 1 and
may flush existing entries.
|
cieProtectedAddr |
.1.3.6.1.4.1.9.9.52.1.3.2.1.2 |
The IP address for protected (secure) node.
|
cieUnprotectedAddr |
.1.3.6.1.4.1.9.9.52.1.3.2.1.3 |
The IP address of the unprotected (insecure) node in
the network.
|
cieConnStatus |
.1.3.6.1.4.1.9.9.52.1.3.2.1.4 |
Integer describing status/type of connection. The pending
and bad connections may be removed after 4 minutes of
non-activity. Open (active) connections may be removed if
they have not transmitted/received traffic in the last
cieEncryptionKeyTimeout minutes.
|
ciePktsEncrypted |
.1.3.6.1.4.1.9.9.52.1.3.2.1.5 |
Total number of packets encrypted for this connection.
|
ciePktsDecrypted |
.1.3.6.1.4.1.9.9.52.1.3.2.1.6 |
Total number of packets decrypted for this connection.
|
ciePktsDropped |
.1.3.6.1.4.1.9.9.52.1.3.2.1.7 |
Total number of packets dropped for this connection. The
packets are dropped only in cases where encryption keys are
not established between the protected entity and the
unprotected entity. An increase in this value indicates the
possibility of mis-configured keys.
|
cieLocalTimeEstablished |
.1.3.6.1.4.1.9.9.52.1.3.2.1.8 |
Value of sysUpTime at which the connection was established or
re-established.
|
cieAlgorithmType |
.1.3.6.1.4.1.9.9.52.1.3.2.1.9 |
Type of encryption algorithm used for this connection.
|
cieTestConnSerialNumber |
.1.3.6.1.4.1.9.9.52.1.4.1.1.1 |
Object which specifies a unique entry in the
cieTestConnTable. A management station wishing
to initiate a crypto session test operation should use a
pseudo-random value for this object when creating
an instance of a cieTestConnEntry.
The RowStatus semantics of the cieTestConnEntryStatus
object will prevent access conflicts.
|
cieTestConnProtectedAddr |
.1.3.6.1.4.1.9.9.52.1.4.1.1.2 |
The IP address of the protected (secure) node, for
the test connection.
|
cieTestConnUnprotectedAddr |
.1.3.6.1.4.1.9.9.52.1.4.1.1.3 |
The IP address of the unprotected (insecure) node for
the test connection.
|
cieTestConnTrapOnCompletion |
.1.3.6.1.4.1.9.9.52.1.4.1.1.4 |
Specifies whether or not a cieTestCompletion
trap should be issued on completion of test crypto session.
If such a trap is desired, it is the responsibility of the
management entity to ensure that the SNMP administrative
model is configured in such a way as to allow the trap to
be delivered.
|
cieTestConnCryptoMapName |
.1.3.6.1.4.1.9.9.52.1.4.1.1.5 |
Specifies name of the crypto map already configured on the
router. A crypto map along with its tag number fully
specifies the enryption policy, such as type of algorithm to
be used, the name of the peer router and access list.
|
cieTestConnCryptoMapTagNumber |
.1.3.6.1.4.1.9.9.52.1.4.1.1.6 |
Specifies tag number of the crypto map already configured on
the router. A crypto map along with its tag number fully
specifies the enryption policy, such as type of algorithm to
be used, the name of the peer router and access list.
|
cieTestConnSessionStatus |
.1.3.6.1.4.1.9.9.52.1.4.1.1.7 |
Set to a value that indicates whether a crypto session was
successfully established, failed or the connection
establishment process is in progress. If the specified crypto
map is not configured, value is set to badCryptoMapName.
|
cieTestConnEntryOwner |
.1.3.6.1.4.1.9.9.52.1.4.1.1.8 |
The entity that configured this entry.
|
cieTestConnEntryStatus |
.1.3.6.1.4.1.9.9.52.1.4.1.1.9 |
The status of this table entry. Once the entry status is
set to active, the associate entry cannot be modified until
the sequence completes (cieTestConnSessionStatus has
value other than inprogress ).
|